Security by design: building a foundation of trust for successful IoT deployments

Because IoT solutions are often deployed in hard to reach locations for a decade or more, pre-planning and foresight are essential to maintaining the integrity of IoT applications.

 

The Thales Security by Design approach ensures that IoT security is considered at the beginning of project design. A successful security architecture ensures that devices are protected in the right location and at the right level to meet the needs of each implementation. 

Thales' security by design strategy begins with a solid foundation of trusted digital device IDs and credentials, which are securely stored in the roots of devices, during manufacturing. Trusted credentials defend against device cloning, data tampering, theft or misuse.

For extra sensitive IoT applications including automotive, healthcare and smart grids, Thales recommends storing IDs and credentials in a tamper-resistant Secure Element to protect both physical and digital access. 

Three Keys to Successful Security Strategy

  • Security by design approach at the beginning of IoT projects
  • Trusted devices IDs and credentials embedded during manufacturing
  • Lock IDs and credentials in secure hardware containers

Security-by-design is the foundation of any secure IoT deployment and pre-embedded IDs and encryption keys are essential elements for secure data encryption, digital signature of messages and over-the-air device and security updates.

Securing data on its way to the cloud

Pre-embedded keys and credentials are also important for simplified data enrollment in IoT cloud platforms. Keys and credentials ensure that IoT devices are authentic and recognized by legitimate partners as trustful. Essentially, this means devices are immediately recognized by external platforms and trust is quickly established for future data exchange.

In addition, Thales uses strong encryption technology to protect the integrity of data and to ensure that only authorized devices and applications can access data through secure digital signature schemes.

Once the data has reached external platforms, it should also be protected. 

Learn about Thales cloud protection solutions
Learn more about securing data to the cloud

Managing the security lifecycle of IoT devices

Managing the lifecycle of security components across the device and cloud spectrum is critical to a robust and long-term digital security strategy and it is often overlooked. 

Security is not a one-off activity, but an evolving part of the IoT ecosystem, that should support IoT deployments´ lifecycle:

  • Adding new devices and decommissioning others
  • Onboarding to new cloud platforms
  • Running secure software updates 
  • Implementing regulated key renewals
  • Maintaining large fleets of devices

All these activities necessitate comprehensive management of identities, keys and tokens. 

To avoid time-consuming and costly services in the field, Security lifecycle management solutions must be able to facilitate updates remotely and execute them across large scale device fleets.

Thales provides state of the art solutions to build a sustainable security lifecycle management infrastructure to address current and future security threats.